Guidelines for the Implementation of MARPOL


Book Description

The Marine Environment Protection Committee (MEPC) of IMO, at its sixty-second session in July 2011, adopted the Revised MARPOL Annex V, concerning Regulations for the prevention of pollution by garbage from ships, which enters into force on 1 January 2013. The associated guidelines which assist States and industry in the implementation of MARPOL Annex V have been reviewed and updated and two Guidelines were adopted in March 2012 at MEPC's sixty-third session. The 2012 edition of this publication contains: the 2012 Guidelines for the implementation of MARPOL Annex V (resolution MEPC.219(63)); the 2012 Guidelines for the development of garbage management plans (resolution MEPC.220(63)); and the Revised MARPOL Annex V (resolution MEPC.201(62)).




Tree Care Industry


Book Description




Handbook of Essential Oils


Book Description

Egyptian hieroglyphs, Chinese scrolls, and Ayurvedic literature record physicians administering aromatic oils to their patients. Today society looks to science to document health choices and the oils do not disappoint. The growing body of evidence of their efficacy for more than just scenting a room underscores the need for production standards, quality control parameters for raw materials and finished products, and well-defined Good Manufacturing Practices. Edited by two renowned experts, the Handbook of Essential Oils covers all aspects of essential oils from chemistry, pharmacology, and biological activity, to production and trade, to uses and regulation. Bringing together significant research and market profiles, this comprehensive handbook provides a much-needed compilation of information related to the development, use, and marketing of essential oils, including their chemistry and biochemistry. A select group of authoritative experts explores the historical, biological, regulatory, and microbial aspects. This reference also covers sources, production, analysis, storage, and transport of oils as well as aromatherapy, pharmacology, toxicology, and metabolism. It includes discussions of biological activity testing, results of antimicrobial and antioxidant tests, and penetration-enhancing activities useful in drug delivery. New information on essential oils may lead to an increased understanding of their multidimensional uses and better, more ecologically friendly production methods. Reflecting the immense developments in scientific knowledge available on essential oils, this book brings multidisciplinary coverage of essential oils into one all-inclusive resource.




Engineering and Design


Book Description

This manual provides practical guidance for the design and operation of soil vapor extraction (SVE) and bioventing (BV) systems. It is intended for use by engineers, geologists, hydrogeologists, and soil scientists, chemists, project managers, and others who possess a technical education and some design experience but only the broadest familiarity with SVE or BV systems.




New Mexico Bouldering


Book Description

The Land of Enchantment is known for its scenic natural beauty and plentiful rock climbing, with its rich geology and excellent climate. This book is the first guide to bouldering in the state and compiles over 1000 problems in central and northern NM, with 40 maps and 240 topographic photos. Areas covered include: Socorro Box Canyon, Albuquerque Sandia Mountains, Ponderosa, the Ortegas and Roy.




Red Eagles


Book Description

From the late 1960s until the end of the Cold War, the United States Air Force acquired and flew Russian-made MiG jets, culminating in a secret squadron dedicated to exposing American fighter pilots to enemy technology and tactics. Red Eagles tells the story of this squadron from the first tests of MiGs following the Vietnam War when the USAF had been woefully under-prepared in aerial combat. These initial flights would develop into the "black" or classified program known internally as Constant Peg. At a secret air base in Nevada, ace American fighter pilots were presented with a range of differnet MiG jets with a simple remit: to expose "the threat" to as many of their brethern as possible. Maintaining and flying these "assets" without without spare parts or manuals was an almost impossible task, putting those flying the MiGs in mortal danger on every flight. Despite these challenges, in all more than 5,900 American aircrews would train against America's secret MiGs, giving them the eskills they needed to face the enemy in real combat situations. For the first time, this book tells the story of Constant Peg and the 4477th Red Eagles Squadron in the words of the men who made it possible.




Spell of Intrigue


Book Description

Fantasy takes a “zany and very, very clever” turn in the second Dance of Gods adventure from the author of Spell of Catastrophe (Kliatt). The port town of Oolsmouth used to be a quiet, peaceful trading city. But with Maximillian the Vaguely Disreputable, Shaa, the Great Karlini, and the Creeping Sword all about to converge there, it seems unlikely to stay that way. The usual power struggles—gods vs. mortals vs. gods-know-who in the everlasting Dance of Gods—are brewing in Oolsmouth, and tension is building. But the ship carrying Shaa and the Great Karlini into town has been hijacked, the Creeping Sword has already missed the boat (literally), and Max has taken a detour to try to discover the secrets of a hopefully long-dead sorcerer. These delays have got everyone wondering: will they make it to Oolsmouth in time for the showdown? More importantly: do they want to? “A lot of confusion, mayhem, action and adventure—but better yet, a sense of the humorous that doesn’t rely on puns.” —Bakka Bookie Sheet “Brenner writes in a quick-paced style which perfectly matches his plot twists . . . A book rich in people, places and complications and one which is enjoyable either by itself or in tandem with the first in the series.” —Quantam




Confessions of an IT Manager


Book Description

Phil Factor is a legend in his own runtime. Scurrilous, absurd, confessional and scathing by turns, Confessions of an IT Manager targets the idiocy, incompetence and overreach of the IT management industry from vantage point all the way up and down the greasy pole. Phil Factor (real name witheld to protest the guilty) has over 20 years experience in the IT industry, specializing in database-intensive applications. For withering insight into the human weaknesses and farcical levels of ineptitude that bring IT projects to their knees, plus occasional escapes into burnished pastiche and cock-a-leg doggerel there is no funnier, more illuminating commentary on the IT crowd.




Essentials of Hospital Infection Control


Book Description

1. Introduction to Healthcare-associated Infections 2. Structural Organization of an Infection Control Program 3. Major Healthcare-associated Infection Types 4. Surveillance of Healthcare-associated Infections 5. Standard Precautions-I: Hand Hygiene 6. Standard Precautions-II: Personal Protective Equipment 7. Transmission-based Precautions 8. Infection Control in Special Situations 9. Disinfection Policy 10. Central Sterile Supply Department 11. Environmental Surveillance 12. Screening for Multidrug-resistant Organisms 13. Infection Control in Laundry 14. Infection Control in Kitchen and Food Safety 15. Waste Management in Healthcare Facility 16. Staff Health Issues-I: Needle Stick Injury Management 17. Staff Health Issues-II: Work Restriction and Vaccination 18. Outbreak Investigation 19. Antimicrobial Stewardship 20. Infection Control Requirements for Accreditation Index




Implementing an Information Security Management System


Book Description

Discover the simple steps to implementing information security standards using ISO 27001, the most popular information security standard across the world. You’ll see how it offers best practices to be followed, including the roles of all the stakeholders at the time of security framework implementation, post-implementation, and during monitoring of the implemented controls. Implementing an Information Security Management System provides implementation guidelines for ISO 27001:2013 to protect your information assets and ensure a safer enterprise environment. This book is a step-by-step guide on implementing secure ISMS for your organization. It will change the way you interpret and implement information security in your work area or organization. What You Will LearnDiscover information safeguard methodsImplement end-to-end information securityManage risk associated with information securityPrepare for audit with associated roles and responsibilitiesIdentify your information riskProtect your information assetsWho This Book Is For Security professionals who implement and manage a security framework or security controls within their organization. This book can also be used by developers with a basic knowledge of security concepts to gain a strong understanding of security standards for an enterprise.